background image

 

 

 

 
 
 
 
 

24 Fast Et 2 Gigabit  

L2 Managed Switch  

User's Manual 

 

 

KS-2262 

 
 

 

Release 2.28 

 
 

Summary of Contents for KS-2262

Page 1: ...24 Fast Ethernet 2 Gigabit L2 Managed Switch User s Manual KS 2262 Release 2 28 ...

Page 2: ... such interference when operated in a commercial environment European Community CE Electromagnetic Compatibility Directive This equipment has been tested and found to comply with the protection requirements of European Emission Standard EN55022 EN60555 2 and the Generic European Immunity Standard EN50082 1 EMC EN55022 1988 CISPR 22 1985 class A EN60555 2 1995 class A EN60555 3 IEC1000 4 2 1995 4K ...

Page 3: ...GH THE SERIAL RS 232 PORT 23 2 1 4 2 CONFIGURING THE MANAGEMENT AGENT THROUGH THE ETHERNET PORT 25 2 1 5 IP ADDRESS ASSIGNMENT 26 2 2 TYPICAL APPLICATIONS 31 3 OPERATION OF WEB BASED MANAGEMENT 33 3 1 WEB MANAGEMENT HOME OVERVIEW 35 3 1 1 SYSTEM INFORMATION 38 3 1 2 IP CONFIGURATION 40 3 1 3 TIME CONFIGURATION 43 3 1 4 ACCOUNT CONFIGURATION 46 3 1 5 MANAGEMENT SECURITY 47 3 1 6 VIRTUAL STACK 50 3 ...

Page 4: ...ARE UPGRADE 151 3 22 REBOOT 152 3 23 LOGOUT 153 4 OPERATION OF CLI MANAGEMENT 154 4 1 CLI MANAGEMENT 154 4 1 1 LOGIN 154 4 2 COMMANDS OF CLI 156 4 2 1 GLOBAL COMMANDS OF CLI 157 4 2 2 LOCAL COMMANDS OF CLI 163 5 MAINTENANCE 249 5 1 RESOLVING NO LINK CONDITION 249 5 2 Q A 249 APPENDIX A TECHNICAL SPECIFICATIONS 250 APPENDIX B NULL MODEM CABLE SPECIFICATIONS 254 ...

Page 5: ...3 ...

Page 6: ...her conditions or walking across a carpeted floor may cause you to acquire a static electrical charge To protect your device always Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device Pick up the device by holding it on the left and right edges only ...

Page 7: ...ce and Ethernet ports step by step Many explanations in detail of hardware and software functions are shown as well as the examples of the operation for web based interface and command line interface CLI Overview of this user s manual Chapter 1 Introduction describes the features of 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH Chapter 2 Installation Chapter 3 Operation of Web based Management Chap...

Page 8: ...overall network management is enhanced and the network efficiency is also improved to accommodate high bandwidth applications In addition the switch features comprehensive and useful function such as QoS Quality of Service Spanning Tree VLAN Port Trunking Bandwidth Control Port Security SNMP RMON and IGMP Snooping capability via the intelligent software It is suitable for both metro LAN and office...

Page 9: ... Security Support allowed denied forwarding and port security with MAC address SNMP RMON SNMP agent and RMON MIB In the device SNMP agent is a client software which is operating over SNMP protocol used to receive the command from SNMP manager server site and echo the corresponded data i e MIB object Besides SNMP agent will actively issue TRAP information when happened RMON is the abbreviation of R...

Page 10: ...ely serve your network Hardware Supports 24 port 10 100M TP ports with Nway and auto MDIX function Supports 2 Gigabit dual media ports TP SFP and 2 slots for removable SFP module supporting 1000M SFP fiber module Supports hot plug fiber transceiver modules Supports 256KB packet buffer and 128KB control memory Maximal packet length can be up to 1536 bytes Full duplex flow control IEEE802 3x and hal...

Page 11: ...ss egress traffic Supports rapid spanning tree 802 1w RSTP Supports 802 1x port security on a VLAN Supports user management and only first login administrator can configure the device The rest of users can only view the switch SNMP access can be disabled and prevent from illegal SNMP access Supports Ingress Non unicast and Egress Bandwidth rating management The trap event and alarm message can be ...

Page 12: ...nel contains a CPURUN Power LED and 26 ports working status of the switch Fig 1 1 Full View of 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH with SFP Module Fig 1 2 Front View of the Unit with SFP Module Power Indication LED Fast Ethernet Port LED SET Mode ACT FDX SPD Gigabit Dual Media Port SFP TP TP Port Status ACT FDX SPD TP Port Status Link LEDSET Button LEDSET button is used to change the LED ...

Page 13: ...et on FDX full duplex mode Lit when full duplex mode is active Blinks when any collision is present c LEDSET set on SPD speed mode Lit when 100Mbps speed is active Off when 10Mbps speed is active 10 100 1000Mbps Gigabit TP Fiber Port 25 26 LED LNK Green Lit when connection with remote device is good Off when cable connection is not good FB Green Lit when Fiber port is active Off when TP port is ac...

Page 14: ...32 DB 9 interface is offered for configuration or management And there is one AC power input socket for having the switch powered on or off Fig 1 3 Rear View of 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH RS 232 DB 9 Connector AC Line 100 240V 50 60 Hz ...

Page 15: ...on 1000Mbps SFP Fiber transceiver is used for high speed connection expansion Refer to KS 2601 Model List file for detailed specification In the list the SFP fiber transceivers include 1000BASE SX standard LC for MMF 1000BASE LX LC for different SMF and Bi Di LC for single SMF Fig 1 4 Front View of 1000Base SX LX LC SFP Fiber Transceiver Fig 1 5 Front View of 1000Base LX BiDi LC SFP Fiber Transcei...

Page 16: ...14 ...

Page 17: ...Switch Note If you have no modules please skip this section Connecting the SFP Module to the Chassis The optional SFP modules are hot swappable so you can plug or unplug it before or after powering on 1 Verify that the SFP module is the right model and conforms to the chassis 2 Slide the module along the slot Also be sure that the module is properly seated against the slot socket connector 3 Insta...

Page 18: ...ded for each RJ 45 port to be connected to a Gigabit 10 100 1000 TP device Now you can start having the switch in operation Power On The switch supports 100 240 VAC 50 60 Hz power supply The power supply will automatically convert the local AC power source to DC power It does not matter whether any connection plugged into the switch or not when power on even modules as well After the power is on a...

Page 19: ...ew the mounting accessory to the front side of the switch See Fig 2 2 Place the Chassis into the 19 inch wiring closet rail and locate it at the proper position Then fix the Chassis by screwing it 2 1 3 Cabling Requirements To help ensure a successful installation and keep the network performance good please take a care on the cabling requirement Cables with worse specification will render the LAN...

Page 20: ...r type there mainly are LC and BiDi LC Gigabit Fiber with multi mode LC SFP module Gigabit Fiber with single mode LC SFP module Gigabit Fiber with BiDi LC 1310nm SFP module Gigabit Fiber with BiDi LC 1550nm SFP module The following table lists the types of fiber that we support and those else not listed here are available upon request Multi mode Fiber Cable and Modal Bandwidth Multi mode 62 5 125µ...

Page 21: ... 10 10 m TP to fiber Converter 56 Bit Time unit 1ns 1sec 1000 Mega bit Bit Time unit 0 01µs 1sec 100 Mega bit Table 2 2 Sum up all elements bit time delay and the overall bit time delay of wires devices must be within Round Trip Delay bit times in a half duplex network segment collision domain For full duplex operation this will not be applied You may use the TP Fiber module to extend the TP node ...

Page 22: ...pports both port based VLAN and tag based VLAN They are different in practical deployment especially in physical location The following diagram shows how it works and what the difference they are Case2a Port based VLAN See Fig 2 4 1 The same VLAN members could not be in different switches 2 Every VLAN members could not access VLAN members each other 3 The switch manager has to assign different nam...

Page 23: ...3 members but they could access VLAN4 members 3 VLAN3 members could not access VLAN1 VLAN2 and VLAN4 4 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members Case3a The same VLAN members can be at different switches with the same VID See Fig 2 6 Fig 2 5 Port based VLAN Diagram Fig 2 6 Attribute based VLAN Diagram ...

Page 24: ...nfigure the switch You can touch them through the following procedures Section 2 1 4 1 Configuring the Management Agent of 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH through the Serial RS 232 Port Section 2 1 4 2 Configuring the Management Agent of 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH through the Ethernet Port Note Please first modify the IP address Subnet mask Default gateway and DNS th...

Page 25: ...ll Modem Cable Specifications 2 Attaches the DB 9 female cable connector to the male serial RS 232 DB 9 connector on the switch 3 Attaches the other end of the serial RS 232 DB 9 cable to PC s serial port running a terminal emulator supporting VT100 ANSI terminal with The switch s serial port default settings For example Windows98 2000 XP HyperTerminal utility Note The switch s serial port default...

Page 26: ...ult IP address 192 168 1 1 to 10 1 1 1 and set the subnet mask to be 255 255 255 0 Then choose your default gateway may be it is 10 1 1 254 Default Value 24 FAST Your Network Setting IP Address 192 168 1 1 10 1 1 1 Subnet 255 255 255 0 255 255 255 0 Default Gateway 192 168 1 254 10 1 1 254 Table 2 3 After completing these settings in the switch it will reboot to have the configuration taken effect...

Page 27: ... of the switch Then follow the procedures listed below 1 Set up a physical path between the configured the switch and a PC by a qualified UTP Cat 5 cable with RJ 45 connector Note If PC directly connects to the switch you have to setup the same subnet mask between them But subnet mask may be different for the PC in the remote site Please refer to Fig 2 9 about the switch s default IP address infor...

Page 28: ...to predefined address classes or categories Each class has its own network range between the network identifier and host identifier in the 32 bits address Each IP address comprises two parts network identifier address and host identifier address The former indicates the network where the addressed host resides and the latter indicates the individual host in the network which the address of host re...

Page 29: ...rved for default route and 127 0 0 0 8 is reserved for loopback function 0 Class B IP address range between 128 0 0 0 and 191 255 255 255 Each class B network has a 16 bit network prefix followed 16 bit host address There are 16 384 2 14 16 networks able to be defined with a maximum of 65534 2 16 2 hosts per network 10 Class C IP address range between 192 0 0 0 and 223 255 255 255 Each class C net...

Page 30: ...t may have a subnet mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits that s using its third byte to subnet this class B network Now it has a subnet mask ...

Page 31: ...12 510 22 1024 1022 21 2048 2046 20 4096 4094 19 8192 8190 18 16384 16382 17 32768 32766 16 65536 65534 Table 2 4 According to the scheme above a subnet mask 255 255 255 0 will partition a network with the class C It means there will have a maximum of 254 effective nodes existed in this sub netted network and is considered a physical network in an autonomous network So it owns a network IP address...

Page 32: ...he switch Use the same network address and append your host address to it Fig 2 12 First IP Address as shown in the Fig 2 12 enter 192 168 1 1 for instance For sure an IP address such as 192 168 1 x must be set on your PC Second Subnet Mask as shown in the Fig 2 12 enter 255 255 255 0 Any subnet mask such as 255 255 255 x is allowable in this case DNS The Domain Name Server translates human readab...

Page 33: ...cification of the switch please refer to Appendix A The switch is suitable for the following applications Central Site Remote site application is used in carrier or ISP See Fig 2 13 Peer to peer application is used in two remote offices See Fig 2 14 Office network See Fig 2 15 Fig 2 13 is a system wide basic reference connection diagram This diagram demonstrates how the switch connects with other ...

Page 34: ...32 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...

Page 35: ...ress row in a browser it will show the following screen see Fig 3 1 and ask you inputting username and password in order to login and access authentication The default username and password are both admin For the first time to use please enter the default username and password and then click the Login button The login process now is completed Just click the link of Forget Password in WebUI See Fig...

Page 36: ...y can only monitor the system For those who have no administrator s identity can only monitor the system There are only a maximum of three users able to login simultaneously in the switch To optimize the display effect we recommend you use Microsoft IE 6 0 above Netscape V7 1 above or FireFox V1 00 above and have the resolution 1024x768 The switch supported neutral web browser interface In Fig 3 2...

Page 37: ...e malfunctioning Fig 3 2 The Information of Page Layout On the top side it shows the front panel of the switch In the front panel the linked ports will display green as to the ports which are link off they will be dark For the optional modules the slot will show only a cover plate if no module exists and will show a module if a module is present The image of module depends on the one you inserted ...

Page 38: ...aving If you do not choose any selection in Auto Logout list it means you turn on the Auto Logout function and the system will be logged out automatically when no action on the device 3 minutes later If OFF is chosen the screen will keep as it is Default is ON On the left side the main menu tree for web is listed in the page They are hierarchical menu Open the function folder a sub menu will be sh...

Page 39: ...37 Port DHCP Boot VLAN System SNMP IGMP Snooping MAC Table GVRP Root STP Trunk 802 1x Alarm Configuration Security Bandwidth QoS Diagnostics TFTP Server Log Firmware Upgrade Reboot Logout ...

Page 40: ... this parameter through the device s user interface or SNMP Device name The name of the switch User defined System up time The time accumulated since this switch is powered up Its format is day hour minute second Current time Show the system time of the switch Its format day of week month day hours minutes seconds year For instance Tue Apr 20 23 25 58 2004 BIOS version The version of the BIOS in t...

Page 41: ...ost MAC address It is the Ethernet MAC address of the management agent in this switch Device Port Show all types and numbers of the port in the switch RAM size The size of the DRAM in this switch Flash size The size of the flash memory in this switch ...

Page 42: ...Parameter description DHCP Setting DHCP is the abbreviation of Dynamic Host Configuration Protocol Here DHCP means a switch to turn ON or OFF the function The switch supports DHCP client used to get an IP address automatically if you set this function Enable When enabled the switch will issue the request to the DHCP server resided in the network to get an IP address If DHCP server is down or does ...

Page 43: ...d Network address Subnet mask number and host address It is shown in the following figure This reduces the total IP number of a network able to support by the amount of 2 power of the bit number of subnet number 2 bit number of subnet number Subnet mask is used to set the subnet mask value which should be the same value as that of the other devices resided in the same network it attaches For more ...

Page 44: ... specify a DNS IP address for the switch With this the switch can translate a mnemonic name address into an IP address There are two ways to specify the IP address of DNS One is fixed mode which manually specifies its IP address the other is dynamic mode which is assigned by DHCP server while DHCP is enabled DNS can help you easily remember the mnemonic address name with the meaningful words in it...

Page 45: ... The time zone is Greenwich centered which uses the expression form of GMT xx hours Function name Time Function description Set the system time by manual input or set it by syncing from Time servers The function also supports daylight saving for different area s time adjustment Parameter description Current Time Show the current time of the system Manual This is the function to adjust the time man...

Page 46: ...rs according to the starting date and the ending date For example if you set the day light saving to be 1 hour When the time passes over the starting time the system time will be increased one hour after one minute at the time since it passed over And when the time passes over the ending time the system time will be decreased one hour after one minute at the time since it passed over The switch su...

Page 47: ...45 Day Light Saving End This is used to set when to stop performing the daylight saving time Mth Range is 1 12 Default 1 Day Range is 1 31 Default 1 Hour Range is 0 23 Default 0 Fig 3 5 ...

Page 48: ...y Guest equivalent identity can modify his password only Please note that you must confirm administrator guest identity in the field of Authorization in advance before configuring the username and password Only one administrator is allowed to exist and unable to be deleted In addition up to 4 guest accounts can be created The default setting for user account is Username admin Password admin The de...

Page 49: ...on inside of the accepting range Accept Deny Accept Deny Accept Rule 3 When only deny lists exist then it will accept all connections excluding the connection inside of the denying range Deny Accept Deny Accept Deny Rule 4 When both accept and deny lists exist then it will deny all connections excluding the connection inside of the accepting range Accept Deny Deny Deny Accept Rule 5 When both acce...

Page 50: ...he user connect to the switch for example we can decide that which VLAN VID is able to be accepted or denied by the switch the IP range of the user could be accepted or denied by the switch the port that the user is allowed or not allowed to connect with the switch or the way of controlling and connecting to the switch via Http Telnet or SNMP Fig 3 7 Parameter description Name A name is composed o...

Page 51: ...d Custom Default is Any Http Telnet and SNMP are three ways for the access and managing the switch in case that Custom had been chosen Action The switch supports two kinds of options for managed valid Action Type including Deny and Accept Default is Deny When you choose Deny action you will be restricted and refused to manage the switch due to the Access Type you choose However while you select Ac...

Page 52: ...evices of the group in the same window without the login of these devices The most top left button is only for Master Device The background color of the button you press will be changed to represent that the device is under your management Note It will remove the grouping temporarily in case that you login the switch via the console The device of the group will be shown as station address the last...

Page 53: ...s Enable Role The role that the switch would like to play in virtual stack Two types of roles including master and slave are offered for option Default is Master Group ID It is the group identifier GID which signs for VSM Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters ...

Page 54: ...etail orderly in the following sections 3 2 1 Port Status The function Port Status gathers the information of all ports current status and reports it by the order of port number media link status port state Auto Negotiation status speed duplex Rx Pause and Tx Pause An extra media type information for the module ports 25 and 26 is also offered Fig 3 9 Status Configuration Simple Counter Detail Coun...

Page 55: ...s active or not If the link is connected to a working well device the Link will show the link Up otherwise it will show Down This is determined by the hardware on both devices of the connection No default value State Show that the communication function of the port is Enabled or Disabled When it is enabled traffic can be transmitted and received via this port When it is disabled no traffic can be ...

Page 56: ...the result will show 100M Full or 100M Half 10M Full and 10M Half duplex In port 25 and port 26 if the media is 1000Mbps with TP media it will show the combinations of 10 100M and Full Half duplex 1000Mbps and Full duplex only If the media is 1000Mbps with fiber media it will show only 1000M Full duplex Default None depends on the result of the negotiation Rx Pause The way that the port adopts to ...

Page 57: ... optical transmitting central wavelength for instance 850nm 1310nm 1550nm and so on Baud Rate Display the maximum baud rate of the fiber module supported for instance 10M 100M 1G and so on Vendor OUI Display the Manufacturer s OUI code which is assigned by IEEE Vendor Name Display the company name of the module manufacturer Vendor P N Display the product name of the naming by module manufacturer V...

Page 58: ...er Date Code Show the date this module was made Temperature Show the current temperature of module Vcc Show the working DC voltage of module Mon1 Bias mA Show the Bias current of module Mon2 TX PWR Show the transmit power of module Mon3 RX PWR Show the receiver power of module ...

Page 59: ... parameters for each port They are State Speed Duplex and Flow Control Parameter description State Set the communication capability of the port is Enabled or Disabled When enabled traffic can be transmitted and received via this port When disabled the port is blocked and no traffic can be transferred through this port Port State is configurable by the user There are only two states Enable and Disa...

Page 60: ...eed Duplex 100M TP ON OFF 10 100M Full Half 1000M TP ON OFF 10 100 1000M Full for all Half for 10 100 1000M Fiber ON OFF 1000M Full In Auto negotiation mode no default value In Forced mode default value depends on your setting Flow Control There are two modes to choose in flow control including Symmetric and Asymmetric If flow control is set Symmetric both parties can send PAUSE frame to the trans...

Page 61: ...each port All of them are described in detail below Fig 3 12 Function name Port Description Function description It is used to set each port s description This human readable description can make the port management easier Parameter description Description This field can enter up to 47 characters for the port description purpose Default Empty ...

Page 62: ...eset and restart counting The data is updated every time interval defined by the user The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds Fig 3 13 Function name Simple Counter Function description Display the summary counting of each port s traffic including Tx Byte Rx Byte Tx Packet Rx Packet Tx Collision and Rx Error Packet...

Page 63: ...61 Rx Packet The counting number of the packet received Tx Collision Number of collisions transmitting frames experienced Rx Error Packet Number of bad packets received ...

Page 64: ...ng If the counting is overflow the counter will be reset and restart counting The data is updated every time interval defined by the user The valid range is 3 to 10 seconds The Refresh Interval is used to set the update frequency Default update time is 3 seconds Fig 3 14 Function name Detail Counter Function description Display the detailed counting number of each port s traffic In the Fig 3 14 th...

Page 65: ... Deferred Transmit Number of frames delayed to transmission due to the medium is busy Tx Late Collision Number of times that a collision is detected later than 512 bit times into the transmission of a frame Tx Excessive Collision Number of frames that are not transmitted because the frame experienced 16 transmission attempts Packets 64 Octets Number of 64 byte frames in good and bad packets receiv...

Page 66: ...Packets Show the counting number of the transmitted pause packet Rx FCS Errors Number of bad FSC packets received Rx Alignment Errors Number of Alignment errors packets received Rx Fragments Number of short frames 64 bytes with invalid CRC Rx Jabbers Number of long frames according tomax_length register with invalid CRC Rx Drop Packets Frames dropped due to the lack of receiving buffer Rx Undersiz...

Page 67: ...ity name trap host and public traps as well as the throttle of SNMP A SNMP manager must pass the authentication by identifying both community names and then it can access the MIB information of the target device So both parties must have the same community name Once completing the setting click Apply button the setting takes effect Parameters description SNMP The term SNMP here is used for the act...

Page 68: ... with SNMP manager receiving the trap message from the managed switch with SNMP agent issuing the trap message 6 trap hosts can prevent the important trap message from losing For each public trap the switch supports the trap event Cold Start Warm Start Link Down Link Up and Authentication Failure Trap They can be enabled or disabled individually When enabled the corresponded trap will actively sen...

Page 69: ...d remove the looping phenomenon per port In general you can unplug the cable connection to stop the looping when a port causes the looping The switch has powerful Looping Detection capability which could cease the looping immediately Fig 3 16 Loop Detection Function name Loop Detection Function description This function will start when you enable looping action by ticking the check box of the Acti...

Page 70: ...ooping happening in real networking environment After any setting you done please click the Apply button to have the setting taken effect When looping has already happened we suggest that the users could choose the looping port as Enable in advance And then tick the check box of the Action That will get the better result for Looping removing Parameters description State Open the Loop Detection cap...

Page 71: ...work device on the LAN will try its best to find the server to get the services or try to set up the predefined links they will issue many broadcast packets in the network The switch supports a random delay time for DHCP and boot delay for each device This suppresses the broadcast storm while all devices are at booting stage in the same time The maximum user defined delay time is 30 sec If DHCP Br...

Page 72: ...icast Router Switch and IP Multicast Host can update the information of the Multicast table when a member port joins or leaves an IP Multicast Destination Address With this function once a switch receives an IP multicast packet it will forward the packet to the members who joined in a specified IP multicast group before The packets will be discarded by the IGMP Snooping if the user transmits multi...

Page 73: ... message to update the database of the Multicast table By the way this also reduces the unnecessary multicast traffic Passive In Passive Snooping mode the IGMP snooping will not periodically poll the hosts in the groups The switch will send a Membership Query message to all hosts only when it has received a Membership Query message from a router IP Address Show all multicast groups IP addresses th...

Page 74: ...uding Any and Custom Default is Any In case that Custom is chosen you can assign effective IP range The valid range is 224 0 0 0 239 255 255 255 VID The switch supports two kinds of options for managed valid VLAN VID including Any and Custom Default is Any When you choose Custom you can fill in VID number The valid VID range is 1 4094 Port The switch supports two kinds of options for managed valid...

Page 75: ...can be created after the parameters as mentioned above had been setup and then press Add button Edit The existed entry also can be modified after pressing Edit button Delete Remove the existed entry of allowed group configuration from the allowed group ...

Page 76: ... filtering list or egress filtering list the packet will be screened with more filtering criteria to determine if it can be forwarded The switch supports supplement of 802 1q Each tag based VLAN you built up must be assigned VLAN name and VLAN ID Valid VLAN ID is 1 4094 User can create total up to 256 Tag VLAN groups Port based Port based VLAN is defined by port Any packet coming in or outgoing fr...

Page 77: ...ing database storing the membership information of the VLAN to learn or look up the information of a VLAN member Double Tag Double tag mode belongs to the tag based mode however it would treat all frames as the untagged ones which means that tag with PVID will be added into all packets Then these packets will be forwarded as Tag based VLAN So the incoming packets with tag will become the double ta...

Page 78: ...76 Fig 3 20 ...

Page 79: ...e and VLAN ID after pressing Add button Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters VID VLAN identifier Each tag based VLAN group has a unique VID It appears only in tag based and Double tag mode Member This is used to enable or disable if a port is a member of t...

Page 80: ...u tick the check box beside the port No packets with this VID outgoing from this port will be untagged Finally press the Apply button to have the setting taken effect Fig 3 22 Delete Group Just press the Delete button to remove the selected group entry from the Tag based group table Edit a group Just select a group entry and press the Edit button then you can modify a group s description member an...

Page 81: ...agged frame While Rule 2 is enabled the port will discard all Untagged frames Fig 3 23 Parameter description Port 1 26 Port number PVID This PVID range will be 1 4094 Before you set a number x as PVID you have to create a Tag based VLAN with VID x For example if port x receives an untagged packet the switch will apply the PVID assume as VID y of port x to tag this packet the packet then will be fo...

Page 82: ... untagged packets to port 2 these packets will own priority 2 precedence due to your default 802 1p Priority Mapping setting in QoS function and be put into Queue 1 Drop Untag Drop untagged frame You can configure a given port to accept all frames Tagged and Untagged or just receive tagged frame If the former is the case then the packets with tagged or untagged will be processed If the later is th...

Page 83: ...te function buttons User can add a new VLAN group by inputting a new VLAN name Parameter description VLAN Name The name defined by administrator is associated with a VLAN group Valid letters are A Z a z 0 9 and _ characters The maximal length is 15 characters Member This is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the c...

Page 84: ...de the port No then press the Apply button to have the setting taken effect Fig 3 25 Delete Group Just press the Delete button to remove the selected group entry from the Port based group table Edit a group Just select a group entry and press the Edit button then you can modify a group s description and member set ...

Page 85: ...tion name Management VLAN Function Description Parameter description State It works when the tag based mode is chosen When this function is enabled only the tagged packets with this VID can manage the switch VID Valid range 1 4094 ...

Page 86: ...selected port Parameter description Port Select the port you would like to inquire Search Set up the MAC entry you would like to inquire The default is MAC Display the MAC address of one entry you selected from the searched MAC entries table Alias Set up the Alias for the selected MAC entry Set Alias Save the Alias of MAC entry you set up Search Find the entry that meets your setup Previous Page M...

Page 87: ...85 Port The port that exists in the searched MAC Entry VID VLAN Group that MAC Entry exists State Display the method that this MAC Entry is built It may show Dynamic MAC or Static MAC Fig 3 26 ...

Page 88: ...it of MAC maintenance is able to limit the amount of MAC that each port can learn Parameter description Aging Time Delete a MAC address idling for a period of time from the MAC Table which will not affect static MAC address Range of MAC Address Aging Time is 10 1000000 seconds The default Aging Time is 300 seconds Learning Limit To set up the maximum amount of MAC that each port can learn Valid va...

Page 89: ...chosen the packet will be dropped if its DA is equal to the value you set up Due to this setting belongs to the global one so it may affect all ports transmission of the packets As static with source drop is chosen the packet will be dropped if its SA is equal to the value you set up Due to this setting belongs to the global one so it may affect all ports transmission of the packets Fig 3 28 Param...

Page 90: ... to this MAC address will be forwarded to this port Static with Destination Drop While the DA of the incoming packets meets the value you set up these packets will be dropped Static with Source Drop While the SA of the incoming packets meets the value you set up these packets will be dropped Port Select the port No you would like to do setup in the switch It is 1 26 ...

Page 91: ...utton to add modify a new or an existed alias name for a specified MAC address or mark an existed entry to delete it Alias name must be composed of A Z a z and 0 9 only and has a maximal length of 15 characters Function name MAC Alias Create Edit or Delete Function description In the MAC Alias function MAC Alias Add Edit function is used to let you add or modify an association between MAC address ...

Page 92: ...net hardware address and usually expressed by hex and separated by hyphens For example 00 40 C7 D6 00 02 Alias MAC alias name you assign Note If there are too many MAC addresses learned in the table we recommend you inputting the MAC address and alias name directly ...

Page 93: ...ir attribute database and GARP Information Propagation GIP to communicate among switches and end stations With GID information and GIP GVRP state machine maintain the contents of Dynamic VLAN Registration Entries for each VLAN and propagate these information to other GVRP aware devices to setup and update their knowledge database the set of VLANs associated with currently active members and throug...

Page 94: ...eave All Time A time period for announcement that all registered device is going to be de registered If someone still issues a new join then a registration will be kept in the switch Valid range 1000 5000 unit time Default 1000 unit time Default Applicant Mode The mode here means the type of participant There are two modes normal participant and non participant provided for the user s choice Norma...

Page 95: ...d EMPTY state Restricted Mode This function is used to restrict dynamic VLAN be created when this port received GVRP PDU There are two modes disable and enable provided for the user s choice Disabled In this mode the switch dynamic VLAN will be created when this port received GVRP PDU The default setting is Normal Enabled In this mode the switch does not create dynamic VLAN when this port received...

Page 96: ...ackets Total GVRP BPDU is received by the GVRP application Invalid GVRP Packets Number of invalid GARP BPDU is received by the GARP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is received by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is received by the GARP application JoinIn Message Packets Number of GARP BPDU wit...

Page 97: ...ed by the GVRP application LeaveAll Message Packets Number of GARP BPDU with Leave All message is transmitted by the GARP application JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is transmitted by the GARP application JoinIn Message Packets Number of GARP BPDU with Join In message is transmitted by the GARP application LeaveEmpty Message Packets Number of GARP BPDU with Le...

Page 98: ...VID VLAN identifier When GVRP group creates each dynamic VLAN group owns its VID Valid range is 1 4094 Member Port Those are the members belonging to the same dynamic VLAN group Edit Administrative Control When you create GVRP group you can use Administrative Control function to change Applicant Mode and Registrar Mode of GVRP group member Refresh Refresh function can help you to see current GVRP ...

Page 99: ...ult is Disabled Bridge ID Show switch s bridge ID which stands for the MAC address of this switch Bridge Priority Show this switch s current bridge priority setting Default is 32768 Designated Root Show root bridge ID of this network segment If this switch is a root bridge the Designated Root will show this switch s bridge ID Designated Priority Show the current root bridge priority Root Port Show...

Page 100: ...odically sending hello message every hello time seconds to the bridge attached to its designated port STP Topology Change Count STP Topology Change Count expresses the time spent in unit of seconds since the beginning of the Spanning Tree Topology Change to the end of the STP convergence Once the STP change is converged the Topology Change count will be reset to 0 The figures showing in the screen...

Page 101: ...dge in the LAN The valid value is 0 61440 The default is 32768 Hello Time Hello Time is used to determine the periodic time to send normal BPDU from designated ports among bridges It decides how long a bridge should send this message to other bridge to tell I am alive When the 24 FAST ETHERNET 2 GIGABIT L2 MANAGED SWITCH is the root bridge of the LAN for example all other bridges will use the hell...

Page 102: ...ate and Learning state to Forwarding state It assumes that forward delay time is 15 seconds and then total forward delay time will be 30 seconds This has much to do with the STP convergent time which will be more than 30 seconds because some other factors The valid value is 4 30 seconds default is 15 seconds Force Version Two options are offered for the user s choosing STP algorithm One is RSTP an...

Page 103: ...CKING state and LISTENING state defined in the 802 1d specification are now all represented as DISCARDING state LEARNING state indicates this port can now contribute its learning knowledge but cannot forward packets still FORWARDING state indicates this port can both contribute its learning knowledge and forward packets normally Path Cost Status It is the contribution value of the path through thi...

Page 104: ...port though an edge port will transit to a normal spanning tree port immediately if it receives a BPDU Default No Admin Point To Point We say a port is a point to point link from RSTP s view if it is in full duplex mode but is shared link if it is in half duplex mode RSTP fast convergence can only happen on point to point links and on edge ports This can expedite the convergence because this will ...

Page 105: ...ending out an RSTP BPDU instead of a legacy STP BPDU at the next transmission The only benefit of this operation is to make the port quickly get back to act as an RSTP port Click M Check button to send a RSTP BPDU from the port you specified Fig 3 35 ...

Page 106: ...h non IEEE 802 3 MAC link Operating in half duplex mode Aggregate the ports with different data rates Static Trunk Ports using Static Trunk as their trunk method can choose their unique Static GroupID also 1 3 this Static groupID can be the same with another LACP groupID to form a logic trunked port The benefit of using Static Trunk method is that a port can immediately become a member of a trunk ...

Page 107: ...ly be made by the system while you are configuring your trunking ports Trunk Setting Rules are listed below Rule1 Maximum 3 groups are allowed Rule 2 The members of each group cannot exceed more than 4 ports Rule 3 Group 1 and 2 cannot exist member 25 and 26 port Rule 4 Group 3 cannot exist member from 1 to 24 port ...

Page 108: ...tatic A port use Static Trunk as its trunk method to get aggregated with other ports also using Static Trunk Group Ports choosing the same trunking method other than None must be assigned a unique Group number i e Group ID valid value is from 1 to 8 in order to declare that they wish to aggregate with each other Active LACP This field is only referenced when a port s trunking method is LACP Active...

Page 109: ...Group ID and using same trunking method will have the opportunity to aggregate to a particular aggregator port This aggregator port is usually the port with the smallest Port No within the trunking group Status This field represents the trunking status of a port which uses a trunking method other than None It also represents the management link status of a port which uses the None trunking method ...

Page 110: ...ggregator It shows the aggregator ID from 1 to 26 of every port In fact every port is also an aggregator and its own aggregator ID is the same as its own Port No Method Show the method a port uses to aggregate with other ports Member Ports Show all member ports of an aggregator port Ready Ports Show only the ready member ports within an aggregator port Fig 3 37 ...

Page 111: ...eer system from this aggregator s view System Priority Show the System Priority part of a system ID MAC Address Show the MAC Address part of a system ID Port Show the port number part of an LACP port ID Key Show the key value of the aggregator The key value is determined by the LACP protocol entity and can t be set through management Trunk Status Show the trunk status of a single member port means...

Page 112: ...ally unique System Identifier for this purpose A system ID is a 64 bit field comprising a 48 bit MAC Address and 16 bit priority value Parameter description System Priority The System Priority can be set by the user Its range is from 1 to 65535 Default 32768 LACP Hash Method DA SA DA and SA are three Hash methods offered for the Link Aggregation of the switch Packets will decide the path to transm...

Page 113: ... an entity being authenticated by an authenticator It is used to communicate with the Authenticator PAE Port Access Entity by exchanging the authentication message when the Authenticator PAE request to it Authenticator An entity facilitates the authentication of the supplicant entity It controls the state of the port authorized or unauthorized according to the result of authentication message exch...

Page 114: ...nd C is in the internal network D is Authentication server running RADIUS switch at the central location acts Authenticator connecting to PC A and A is a PC outside the controlled port running Supplicant PAE In this case PC A wants to access the services on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenti...

Page 115: ...ill initiate EAPOL Start the process by sending to the authenticator 5 And next the Supplicant replies an EAP Response Identity to the authenticator The authenticator will embed the user ID into Radius Access Request command and send it to the authentication server for confirming its identity 6 After receiving the Radius Access Request the authentication server sends Radius Access Challenge to the...

Page 116: ...henticator receives a Radius Access Reject it will send an EAP Failure to the supplicant This means the supplicant is failed to authenticate The port it connected is in the unauthorized state the supplicant and the devices connected to this port won t be allowed to access the network 10 When the supplicant issue an EAP Logoff message to Authentication server the port you are using is set to be una...

Page 117: ...inguish the device s MAC address and it s VID The following table is the summary of the combination of the authentication status and the port status versus the status of port mode set in 802 1x Port mode port control state set in 802 1x port setting Here Entry Authorized means MAC entry is authorized Port Mode Port Control Authentication Port Status Disable Don t Care Don t Care Port Uncontrolled ...

Page 118: ...rver for the authentication service The valid value ranges 1 65535 Default port number is 1812 Secret Key The secret key between authentication server and authenticator It is a string with the length 1 31 characters The character string may contain upper case lower case and 0 9 It is character sense It is not allowed for putting a blank between any two characters Default Radius Accounting Service ...

Page 119: ...117 The port number to communicate with Accounting server for the accounting service The valid value ranges 1 65535 Default port number is 1813 ...

Page 120: ...x operation mode 802 1x Mode 802 1x operation mode There are two options including Disable and Multi host mode Default is Disable Disable It will have the chosen port acting as a plain port that is no 802 1 x port access control works on the port 802 1x with Multi host In Multi host mode for the devices connected to this port once a supplicant is authorized the devices connected to this port can a...

Page 121: ... the admittance of 802 1X authenticator The Port Status will show the following screen Port Number The port number to be chosen to show its 802 1X Port Status The valid number is Port 1 26 Port Status The current 802 1X status of the port In Disable mode this field is Disabled 802 1x with Multihost mode When selecting 802 1x with Multihost mode for a port in the function 802 1X Port Mode Configura...

Page 122: ...ration mode supported ForceUnauthorized ForceAuthorized Auto ForceUnauthorized The controlled port is forced to hold in the unauthorized state ForceAuthorized The controlled port is forced to hold in the authorized state Auto The controlled port is set to be in authorized state or unauthorized state depends on the result of the authentication exchange between the authentication server and the supp...

Page 123: ... the authenticator will retransmit an EAP Request to the supplicant before it times out the authentication session The valid range 1 10 Default 2 times suppTimeout 1 65535 s A timeout condition in the exchange between the authenticator and the supplicant The valid range 1 65535 Default 30 seconds serverTimeout 1 65535 s A timeout condition in the exchange between the authenticator and the authenti...

Page 124: ...e SMS short message system and trap The message will be sent while users tick the trap event individually on the web page shown as below Parameter description Trap Cold Start Warm Start Link Down Link Up Authentication Failure User login User logout STP STP Topology Changed STP Disabled STP Enabled LACP LACP Disabled LACP Enabled LACP Member Added LACP Port Failure GVRP GVRP Disabled GVRP Enabled ...

Page 125: ...n user can read the trap information from the email or the mobile phone This function provides 6 email addresses and 6 mobile phone numbers at most The 21 different trap events will be sent out to SNMP Manager when trap event occurs After ticking trap events you can fill in your desired email addresses and mobile phone numbers Then please click Apply button to complete the alarm configuration It w...

Page 126: ... Password your password on the mail server Email Address 1 6 email address that would like to receive the alarm message SMS SMS Server the IP address of the server transferring your SMS Username your username in ISP Password your username in ISP Mobile Phone 1 6 the mobile phone number that would like to receive the alarm message Fig 3 48 ...

Page 127: ...P address the IP address will restore to default 192 168 1 1 as you use it The other is the function of Restore Default Configuration without changing current IP address the IP address will keep the same one that you had saved before by performing this function Working Configuration It is the configuration you are using currently and can be changed any time The configurations you are using are sav...

Page 128: ... will also be restored to 192 168 1 1 Function name Restore Default Configuration excludes current IP address Function description Restore Default Configuration function can retrieve factory setting to replace the start configuration However the switch s current IP address that the user set up will not be changed and will NOT be restored to 192 168 1 1 as well Function name Restore User Configurat...

Page 129: ... t be changed by config file This feature is designed for preventing remote device lose control after import Parameter description Export File Path Export Start Export Save As Start s config file stored in the flash Export User Conf Export Save As User s config file stored in the flash Import File Path Import Start Import Save As Start s config file stored in the flash Import User Conf Import Save...

Page 130: ...ctivation or de activation of Port Mirror function Default is disable Monitoring Port Set up the port for monitoring Valid port is Port 1 26 and default is Port 1 Monitored Ingress Port Set up the port for being monitored It only monitor the packets received by the port you set up Just tick the check box beside the port x and valid port is Port 1 26 Monitored Egress Port Set up the port for being ...

Page 131: ...to immediately find and solve the port that results in the occurrence of looping problems in the network Parameter description Mode Used for the activation or de activation of Isolated Group function Default is disable Isolated Group User can choose any port to be the member of this group Just tick the check box beside the port x and valid port is Port 1 26 In this group all of these member ports ...

Page 132: ...ress mode of Restricted Group Parameter description Mode Used for the activation or de activation of Restricted Group function Default is disable Ingress Select the ports that you would like their Restricted Group to set into Ingress mode Just tick the check box beside the port x and valid port is Port 1 26 Egress Select the ports that you would like their Restricted Group to set into Egress mode ...

Page 133: ...Valid range of the port is 1 26 Rate Set up the limit of Ingress bandwidth for the port you choose Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field Pause frames are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 24 ranges from 66 102400 and Port 25 26 ranges from 66 102...

Page 134: ...f the port is 1 26 Rate Set up the limit of Egress bandwidth for the port you choose Packet transmission will be delayed if the rate exceeds the value you set up in Data Rate field Traffic may be lost if egress buffers run full The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 24 ranges from 66 102400 and Port 25 26 ranges from 66 1024000 with the minimum uni...

Page 135: ...rol Enable the function of bandwidth storm control for broadcast packets Multicast Storm Control Enable the function of bandwidth storm control for multicast packets Unknown Unicast Storm Control Enable the function of bandwidth storm control for unknown unicast packets These packets are the MAC address that had not completed the learning process yet Broadcast Multicast Unknown Unicast Storm Contr...

Page 136: ...134 Storm Rate Set up the limit of bandwidth for storm type you choose Valid value of the storm rate ranges from 1 100 with the minimum unit of 1 And only integer is acceptable Default is 100 ...

Page 137: ...it requests low delay the T bit requests high throughput the R bit requests high reliability and the M bit requests low cost DiffServ DSCP Priority act on DSCP field of IP Header In the late 1990s the IETF redefined the meaning of the 8 bit SERVICE TYPE field to accommodate a set of differentiated services DS Under the differentiated services interpretation the first six bits comprise a codepoint ...

Page 138: ...d TOS 2 enable both VIP and DSCP Choose priorities of VIP and DSCP 3 enable both TOS and DSCP Choose DSCP 4 enable both VIP and DSCP Choose priorities of VIP and DSCP 5 enable both 802 1p and TOS Choose TOS 6 enable both 802 1p and DSCP Choose DSCP 7 enable both 802 1p and DSCP and TOS Choose DSCP 8 enable both 802 1p and DSCP and TOS and VIP Choose priorities of VIP and DSCP VIP DSCP TOS 802 1p F...

Page 139: ...ueue 0 to queue 3 Parameter description QoS Mode You can Enable QoS Mode and let QoS function become effective Default is Disable Priority Control Just tick the check box of 802 1P TOS or DSCP QoS and click Apply button to be in operation Scheduling Method There are two Scheduling Method WRR and Strict Priority Default is WRR After you choose any of Scheduling Method please click Apply button to b...

Page 140: ...om port 2 and port 3 to port 1 at speed of 100MB and let congestion happen The packets for port 3 will be dropped because the packets from port 2 own highest precedence For the sake of this function taking effect you must choose Scheduling Method of Strict Priority ahead Parameter description VIP Port Just tick the check box to select any port port 1 26 as the VIP Port Then click the Apply button ...

Page 141: ...nt bandwidth distribution according to your weight setting Parameter description 802 1p Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to Queue 0 Priority 2 is mapping to Queue 1 Priority 3 is mapping to Queue 1 Priority 4 is mapping to Queue 2 Priority 5 is mapping to Queue 2 Priority 6 is mapping to Queue 3 and P...

Page 142: ... 3 bits can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Delay Priority Mapping works while D TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description TOS Delay Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mapping to ...

Page 143: ...ts can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Throughput Priority Mapping works while T TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description TOS Throughput Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mappin...

Page 144: ...s can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Reliability Priority Mapping works while R TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description TOS Reliability Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is mappi...

Page 145: ...can arrange 8 kinds of priorities corresponding to the 0 7 priority in the following priority diagram TOS Monetary Cost Priority Mapping works while M TYPE in TOS field of IP header of the packets received by the switch is configured Parameter description TOS Monetary Cost Priority Mapping Each Priority can select any of Queue 0 Queue 3 In Default Priority 0 is mapping to Queue 0 Priority 1 is map...

Page 146: ...bits are left unused DSCP can form total 64 0 63 kinds of Traffic Class based on the arrangement of 6 bit field in DSCP of the IP packet In the switch user is allowed to set up these 64 kinds of Class that belong to any of queue 0 3 Parameter description DSCP Priority Mapping 64 kinds of priority traffic as mentioned above user can set up any of Queue 0 3 In default Priority 0 15 are mapping to Qu...

Page 147: ...e described in detail orderly in the following sections Function name Diagnostics Function description Diagnostics function provides a set of basic system diagnosis It let users know that whether the system is health or needs to be fixed The basic system check includes EEPROM test UART test DRAM test and Flash test Fig 3 64 Diagnostics Loopback Test Diagnostics Ping Test ...

Page 148: ...ps around in the switch box As to the latter test function it will send the test signal to its link partner If you do not have them connected to active network devices i e the ports are link down the switch will report the port numbers failed If they all are ok it just shows OK Note Whatever you choose Internal Loopback Test or External Loopback Test these two functions will interfere with the nor...

Page 149: ...that if the target device is available or not You can simply fill in a known IP address and then click Ping button After a few seconds later the switch will report you the pinged device is alive or dead in the field of Ping Result Parameter description IP Address An IP address with the version of v4 e g 192 168 1 1 Default Gateway IP address of the default gateway For more details please see the s...

Page 150: ...erver Function description Set up IP address of TFTP server Parameter description Specify the IP address where the TFTP server locates Fill in the IP address of your TFTP server then press Apply button to have the setting taken effect Fig 3 67 ...

Page 151: ...me Log Data Function description The Trap Log Data is displaying the log items including all SNMP Private Trap events SNMP Public traps and user logs occurred in the system In the report table No Time and Events are three fields contained in each trap record Fig 3 68 Parameter description No Display the order number that the trap happened Time Display the time that the trap happened Events Display...

Page 152: ...150 Upload Log Upload log data through tftp Clear Log Clear log data ...

Page 153: ... should be filled in 2 Specifying what the filename and where the file is You must specify full path and filename Then press Upgrade button if your download is not successful the switch will also be back to Software Upgrade and it will not upgrade the software as well When download is completed the switch starts upgrading software A reboot message will be prompted after completing upgrading softwa...

Page 154: ...eboot to have the new configuration taken effect Here we are discussing is software reset for the reboot in the main menu Function name Reboot Function description Reboot the switch Reboot takes the same effect as the RESET button on the front panel of the switch It will take around thirty 30 seconds to complete the system boot Parameter description Save and Reboot Save the current settings as sta...

Page 155: ... the system without the permission If you do not logout and exit the browser the switch will automatically have you logout Besides this manually logout and implicit logout you can pull down the Auto Logout list at the left top corner to explicitly ON OFF this logout function Parameter description Auto Logout Default is ON If it is ON and no action and no key is stroke as well in any function scree...

Page 156: ...es Menu configure the parameters as below see the next section Baud rate 57600 Stop bits 1 Data bits 8 Parity N Flow control none 4 1 1 Login The command line interface CLI is a text based interface User can access the CLI through either a direct serial connection to the device or a Telnet session The default values of the managed switch are listed below Username admin Password admin After you log...

Page 157: ...155 Managed Switch 2262 FE Switch Login admin Password 2262 Fig 4 1 Managed Switch 2262 FE Switch Login admin Password 2262 Fig 4 2 ...

Page 158: ... help history logout save start save user restore default and restore user For more details please refer to Section 4 2 1 Command instructions reside in the corresponding modes are local commands The same command with the same command name may occur but perform totally different function in different modes For example show in IP mode performs displaying the IP information however it performs displ...

Page 159: ...of the top mode Argument None Possible value None Example FE2262 alarm FE2262 alarm events FE2262 alarm events end FE2262 exit Syntax exit Description Back to the previous mode When you enter this command your current position would move back to the previous mode If you use this command in the top mode you are still in the position of the top mode Argument None Possible value None Example FE2262 t...

Page 160: ...ue None Example FE2262 ip FE2262 ip help Local commands disable dhcp Disable DHCP enable dhcp Enable DHCP and set dns auto or manual set dns Set dns set ip Set ip and gateway show Show IP Configuration Global commands end Back to the top mode exit Back to the previous mode help Show available commands history Show a list of previously run commands logout Logout the system restore default Restore d...

Page 161: ...list total records up to 256 If optional argument is given the CLI would only show the last numbers of records given by the argument Argument show last number of history records optional Possible value 1 2 3 256 Example FE2262 ip history Command history 0 1 trunk 2 exit 3 FEL2SW 26 trunk 4 FEL2SW 26 trunk exit 5 FEL2SW 26 6 trunk 7 exit 8 alarm 9 events 10 end 11 ip 12 help 13 history FE2262 ip hi...

Page 162: ... n If you choose Y or y the IP address will restore to default 192 168 1 1 If you choose N or n the IP address will keep the same one that you had saved before If restoring default successfully the CLI would prompt if reboot immediately or not If you press Y or y the system would reboot immediately otherwise it would be back to the CLI system After restoring default configuration all the changes i...

Page 163: ...e entire startup configuration would replace as user defined one Argument None Possible value None Example FE2262 restore user Restoring Restore user configuration successfully Do you want to reboot the system y n save start Syntax save start Description To save the current configuration as the start one When you enter this command the CLI would save your current configuration into the non volatil...

Page 164: ...guration as the user defined configuration When you enter this command the CLI would save your current configuration into the non volatile FLASH as user defined configuration Argument None Possible value None Example FE2262 save user Saving user Save Successfully FE2262 ...

Page 165: ...x 1 5 7 available from 1 to 26 times max times range 1 10 Possible value port range 1 to 26 times 1 10 default is 2 Example FE2262 802 1x set max request 2 2 set mode Syntax set mode port range mode Description To set up the 802 1X authentication mode of each port Argument port range syntax 1 5 7 available from 1 to 26 mode set up 802 1x mode 0 disable the 802 1x function 1 set 802 1x to Multi hos...

Page 166: ...tate machine to define periods of time during when it will not attempt to acquire a Supplicant Argument port range syntax 1 5 7 available from 1 to 26 sec timer range 0 65535 Possible value port range 1 to 26 sec 0 65535 default is 60 Example FE2262 802 1x set quiet period 2 30 set reAuthEnabled Syntax set reAuthEnabled port range ebl Description A constant that define whether regular reauthentica...

Page 167: ... 7 available from 1 to 26 sec timer range 1 65535 Possible value port range 1 to 26 sec 1 65535 default is 3600 Example FE2262 802 1x set reAuthPeriod 2 3600 set serverTimeout Syntax set serverTimeout port range sec Description A timer used by the Backend Authentication state machine in order to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentic...

Page 168: ...iption A timer used by the Backend Authentication state machine in order to determine timeout conditions in the exchanges between the Authenticator and the Supplicant or Authentication Server The initial value of this timer is either suppTimeout or serverTimeout as determined by the operation of the Backend Authentication state machine Argument port range syntax 1 5 7 available from 1 to 26 sec ti...

Page 169: ...Mode 1 Disable 2 Multi host 3 Disable 4 Disable 5 Disable 6 Disable show parameter Syntax show parameter Description To display the parameter settings of each port Argument None Possible value None Example FE2262 802 1x show parameter port 1 port control Auto reAuthMax 2 txPeriod 30 Quiet Period 60 reAuthEnabled ON reAuthPeriod 3600 max Request 2 suppTimeout 30 serverTimeout 30 ...

Page 170: ...ple FE2262 802 1x show security Port Mode Status 1 Disable 2 Multi host Unauthorized 3 Disable 4 Disable 5 Disable 6 Disable show state Syntax show state Description To display the Radius server configuration Argument None Possible value None Example FE2262 802 1x show state Radius Server 192 168 1 115 Port Number 1812 Secret Key WinRadius ...

Page 171: ...ord Argument name new account name Possible value name A string must be at least 5 character Example FEL2SW 26 account add aaaaa Password Confirm Password FEL2SW 26 account del Syntax del name Description To delete an existing account Argument name existing user account Possible value None Example FEL2SW 26 account del aaaaa Account aaaaa deleted ...

Page 172: ...y aaaaa username password the length is from 5 to 15 Current username aaaaa bbbbb New password Confirm password Username changed successfully Password changed successfully show Syntax show Description To show system account including account name and identity Argument None Possible value None Example FEL2SW 26 account show Account Name Identity admin Administrator guest guest bbbbb guest ...

Page 173: ...er user Syntax del server user Description To remove the server user account and password Argument None Possible value None Example FEL2SW 26 alarm email del server user set mail address Syntax set mail address mail address Description To set up the email address Argument email address number range 1 to 6 mail address email address Possible value 1 to 6 Example FEL2SW 26 alarm email set mail addre...

Page 174: ...To set up the account of the email server Argument username email server account Possible value None Example FEL2SW 26 alarm email set user event gmail com show Syntax show Description To display the configuration of e mail trap event Argument None Possible value None Example FEL2SW 26 alarm email show Mail Server 192 168 1 6 Username admin Password Email Address 1 abc mail abc com Email Address 2...

Page 175: ...rm events del all 1 3 del email Syntax del email range Description To disable the email of the events Argument range del the range of email syntax 1 5 7 Possible value range 1 21 Example FEL2SW 26 alarm events del email 1 3 del sms Syntax del sms range Description To disable the sms of the events Argument range del the range of sms syntax 1 5 7 Possible value range 1 21 Example FEL2SW 26 alarm eve...

Page 176: ...ntax set all range Description To enable email sms and trap of events Argument range set the range of email sms and trap of events syntax 1 5 7 Possible value range 1 21 Example FEL2SW 26 alarm events set all 1 3 set email Syntax set email range Description To enable the email of the events Argument range set the range of email syntax 1 5 7 Possible value range 1 21 Example FEL2SW 26 alarm events ...

Page 177: ...t the range of sms syntax 1 5 7 Possible value range 1 21 Example FEL2SW 26 alarm events set sms 1 3 set trap Syntax set trap range Description To enable the trap of the events Argument range set the range of trap syntax 1 5 7 Possible value range 1 21 Example FEL2SW 26 alarm events set trap 1 3 ...

Page 178: ...rap 1 Cold Start v 2 Warm Start v 3 Link Down v 4 Link Up v 5 Authentication Failure v 6 User Login 7 User Logout 8 STP Topology Changed 9 STP Disabled 10 STP Enabled 11 LACP Disabled 12 LACP Enabled 13 LACP Member Added 14 LACP Port Failure 15 GVRP Disabled 16 GVRP Enabled 17 Port based Vlan Enabled 18 Tag based Vlan Enabled 19 Module Inserted 20 Module Removed 21 Module Media Swapped ...

Page 179: ... show events FEL2SW 26 alarm show sms sms del phone number Syntax del phone number Description To delete sms phone number Argument mobile phone number range 1 to 6 Possible value 1 to 6 Example FEL2SW 26 alarm sms del phone number 3 del server user Syntax del server user Description To delete sms server user account and password Argument None Possible value None Example FEL2SW 26 alarm sms del ser...

Page 180: ...one number 1 0968777777 set server Syntax set server ip Description To set up the IP address of sms server Argument ip SMS server ip address or domain name Possible value None Example FEL2SW 26 alarm sms set server 192 168 1 7 set user Syntax set user username Description To set up user account and password of sms server Argument username SMS server account Possible value None Example FEL2SW 26 al...

Page 181: ...he configuration of SMS trap event Argument None Possible value None Example FEL2SW 26 alarm sms show SMS Server 192 168 1 7 Username ABC Password Mobile Phone 1 0968777777 Mobile Phone 2 Mobile Phone 3 Mobile Phone 4 Mobile Phone 5 Mobile Phone 6 ...

Page 182: ... 7 available from 1 to 26 data_rate 66 1024000 Kb port 1 24 66 102400 Kb port 25 26 66 1024000 Kb Possible value range 1 to 26 data_rate 66 102400 Kb for port 1 24 66 1024000 Kb for port 25 26 Example FEL2SW 26 bandwidth set egress rate 1 16 299 set ingress rate Syntax set ingress rate range data_rate Description To set up the ingress rate of the ports Argument range syntax 1 5 7 available from 1 ...

Page 183: ...00 The value must be the integer The value 100 disables broadcast storm control Possible value range 1 to 5 data_rate 1 100 Example FEL2SW 26 bandwidth set storm rate 2 99 show Syntax show Description To display all current settings of the bandwidth Argument None Possible value None Example FEL2SW 26 bandwidth show Port Ingress Rate Kb Egress Rate Kb 1 102400 102400 2 102400 102400 3 102400 102400...

Page 184: ...ort successful export user conf Syntax export user conf Description To run the export user conf function Argument None Possible value None Example FEL2SW 26 config file export user conf Export successful import start Syntax import start Description To run the import start function Argument None Possible value None Example FEL2SW 26 config file import start Import successful ...

Page 185: ...le path and filename that user would like to export Argument filepath filepath and filename Possible value filepath filepath and filename Example FEL2SW 26 config file set export path log 21511 txt set import path Syntax set import path filepath Description To set up the filepath and filename that user would like to import Argument filepath filepath and filename Possible value filepath filepath an...

Page 186: ...Path and Filename log 21511 txt dhcp boot set dhcp boot Syntax set sec Description To set up the delay time for DHCP Boot Argument sec range syntax 0 1 30 The value 0 is to disable dhcp boot delay Possible value sec 0 30 Example FEL2SW 26 dhcp boot set 30 show Syntax show Description To display the status of DHCP Boot Argument None Possible value None Example FEL2SW 26 dhcp boot show DHCP Boot Ena...

Page 187: ...back Test Argument None Possible value None Example FEL2SW 26 diag loopback Internal Loopback Test OK External Loopback Test Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Fail ping Syntax ping ip Description To confirm that whether the remote end station or switch itself is alive or not Argument ip IP address or domain name Possible value IP address e g 192 168 2 65 or ...

Page 188: ...186 192 168 1 115 is alive ...

Page 189: ...ware set upgrade path FEL2SW26_v2 05 img show Syntax show Description To display the information of tftp server and upgrade path and file name Argument None Possible value None Example FEL2SW 26 firmware show TFTP Server IP Address 192 168 3 111 Path and Filename FEL2SW26_v2 05 img upgrade Syntax upgrade Description To run the software upgrade function Argument None Possible value None Example FEL...

Page 190: ...W 26 gvrp enable group Syntax group group number Description To enter any of gvrp group for changing gvrp group setting You can change the applicant or registrar mode of existing gvrp group per port Argument group number enter which gvrp group you had created using value is vid Available range 1 to 4094 Possible value group number 1 4094 Example FEL2SW 26 gvrp show group GVRP group information Cur...

Page 191: ...Normal Normal 12 Normal Normal 13 Normal Normal 23 Normal Normal 24 Normal Normal 25 Normal Normal 26 Normal Normal FEL2SW 26 gvrp group 2 set registrar 1 10 fixed FEL2SW 26 gvrp group 2 show GVRP group VID 2 Port Applicant Registrar 1 Non Participant Fixed 2 Non Participant Fixed 3 Non Participant Fixed 4 Non Participant Fixed 5 Non Participant Fixed 6 Non Participant Fixed 7 Normal Fixed 8 Norma...

Page 192: ...orbidden Description To set default registrar mode for each port Argument range port range syntax 1 5 7 available from 1 to 26 normal set registrar as normal mode fixed set registrar as fixed mode forbidden set registrar as forbidden mode Possible value range 1 to 26 normal fixed forbidden normal or fixed or forbidden Example FEL2SW 26 gvrp set registrar 1 5 fixed set restricted Syntax set restric...

Page 193: ...0 1000 Normal Normal Enable 4 20 60 1000 Normal Normal Enable 5 20 60 1000 Normal Normal Enable 6 20 60 1000 Normal Normal Enable 7 20 60 1000 Normal Normal Enable 8 20 60 1000 Normal Normal Enable 9 20 60 1000 Normal Normal Enable 10 20 60 1000 Normal Normal Enable 22 20 60 1000 Normal Normal Disable 23 20 60 1000 Normal Normal Disable 24 20 60 1000 Normal Normal Disable 25 20 60 1000 Normal Norm...

Page 194: ...20 to 100 leave 60 to 300 leaveall 1000 to 5000 Example FEL2SW 26 gvrp set timer 2 8 25 80 2000 show config Syntax show config Description To display the gvrp configuration Argument None Possible value None Example FEL2SW 26 gvrp show config GVRP state Disable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted 1 20 60 1000 Normal Normal Disable 2 20 60 1000 Normal Normal Disabl...

Page 195: ...P Counter port 2 Counter Name Received Transmitted Total GVRP Packets 0 0 Invalid GVRP Packets 0 LeaveAll message 0 0 JoinEmpty message 0 0 JoinIn message 0 0 LeaveEmpty message 0 0 Empty message 0 0 show group Syntax show group Description To show the gvrp group Argument None Possible value None Example FEL2SW 26 gvrp show group GVRP group information Current Dynamic Group Number 0 VID Member Por...

Page 196: ... group Argument ip multicast the range of IP multicast vid vlan ID 1 4094 or any port range syntax 1 5 7 available from 1 to 26 Possible value ip multicast ex 224 1 1 1 225 2 3 3 or any vid 1 4094 or any port range 1 to 26 Example FEL2SW 26 igmp snooping add allowed group 224 1 1 1 225 2 3 3 100 1 10 del allowed group Syntax del allowed group index Description To remove the entry of allowed IP mul...

Page 197: ...ow igmp snooping Description To display IGMP snooping mode and allowed IP multicast entry Argument None Possible value None Example FEL2SW 26 igmp snooping show igmp snooping Snoop Mode Active IP Multicast 1 IP Address 224 1 1 1 VLAN ID 0 Member Port 22 show multicast Syntax show multicast Description To display IP multicast table Argument None Possible value None Example FEL2SW 26 igmp snooping s...

Page 198: ...hcp manual auto Description To enable the system DHCP function and set DNS server via manual or auto mode Argument manual auto set DNS by using manual or auto mode Possible value manual auto manual or auto Example FEL2SW 26 ip enable dhcp manual set dns Syntax set dns ip Description To set the IP address of DNS server Argument ip dns ip address Possible value ip 168 95 1 1 Example FEL2SW 26 ip set...

Page 199: ...3 or others Example FEL2SW 26 ip set ip 192 168 1 2 255 255 255 0 192 168 1 253 show Syntax show Description To display the system s DHCP function state IP address subnet mask default gateway DNS mode DNS server IP address and current IP address Argument None Possible value None Example FEL2SW 26 ip show DHCP Disable IP Address 192 168 1 1 Current IP Address 192 168 1 1 Subnet mask 255 255 255 0 G...

Page 200: ...e auto upload Syntax disable auto upload Description To disable the auto upload function Argument None Possible value None Example FEL2SW 26 log disable auto upload enable auto upload Syntax enable auto upload Description To enable the auto upload function Argument None Possible value None Example FEL2SW 26 log enable auto upload ...

Page 201: ...ange Description Disable LD and corresponding action Disable LD per port Argument port range The range of your setting disabled loop detection with ports Possible value port range syntax 1 5 7 available from 1 to 26 Example FEL2SW 26 loop detection disable port 1 5 6 enable action Syntax enable action Description Enable LD and corresponding action Enable the locked port action when loop occurs Arg...

Page 202: ...on status Argument None Possible value None Example FEL2SW 26 loop detection show Locked port action Enable Port Loop detection Current status 1 Disable Unlocked 2 Disable Unlocked 3 Disable Unlocked 4 Disable Unlocked 5 Disable Unlocked 6 Disable Unlocked 7 Enable Unlocked 8 Enable Unlocked 9 Enable Unlocked 10 Disable Unlocked 11 Disable Unlocked 12 Disable Unlocked 13 Disable Unlocked 14 Disabl...

Page 203: ...Possible value None Example FEL2SW 26 log show Tftp Server 0 0 0 0 Auto Upload Disable 1 Wed Apr 13 12 13 27 2005 Link Up Port 1 2 Wed Apr 13 12 13 26 2005 Link Down Port 1 3 Wed Apr 13 11 58 31 2005 Login admin 4 Wed Apr 13 11 19 45 2005 Login admin 5 Wed Apr 13 11 19 37 2005 Logout admin upload Syntax Upload Description To upload log data through tftp Argument None Possible value None Example FE...

Page 204: ...tion To set up the mac alias entry Argument mac mac address format 00 02 03 04 05 06 alias mac alias name max 15 characters Possible value mac mac address alias max 15 characters Example FEL2SW 26 mac table alias set 00 44 33 44 55 44 www show Syntax show Description To display the mac alias entry Argument None Possible value None Example FEL2SW 26 mac table alias show MAC Alias List MAC Address A...

Page 205: ...re 0 as untagged Possible value port 1 to 26 vid 0 1 4094 Example FEL2SW 26 mac table information search 1 26 MAC Table List Alias MAC Address Port VID State 00 40 c7 88 00 06 1 0 Dynamic FEL2SW 26 mac table information show Syntax show Description To display all mac table information Argument None Possible value None Example FEL2SW 26 mac table information show MAC Table List Alias MAC Address Po...

Page 206: ...ning Syntax set learning port num Description To set up the maximum amount of MAC that each port can learn Argument port port range syntax 1 5 7 available from 1 to 24 num MAC address numbers which can be dynamically learned num range between 0 to 8191 0 for learning disabled Possible value port 1 to 24 num 0 to 8191 Example FEL2SW 26 mac table maintain set learning 5 100 show Syntax show Descript...

Page 207: ...cription To add the static mac entry Argument mac mac address format 01 02 03 04 05 06 vid vlan id from 1 to 4094 queue which queue you want to set from 0 to 3 rule forwarding rule from 0 to 2 0 static 1 drop destination address matches 2 drop source address matches port forwarded destination port from 1 to 26 Possible value vid 1 to 4094 queue 0 to 3 rule 0 to 2 port 1 to 26 Example FEL2SW 26 mac...

Page 208: ...Possible value mac mac address Example FEL2SW 26 mac table static mac del 00 02 03 04 05 06 show Syntax show Description To display static mac entry Argument None Possible value None Example FEL2SW 26 mac table static mac show MAC VID Queue Forwarding Rule Port 1 00 40 C7 D6 00 01 200 2 Static with Destination Drop 2 ...

Page 209: ...ement policy records Argument name value ACL entry name vid value VLAN ID ip value IP range port value Incoming port type value Access type action value a ccept or d eny Possible value name value No default and it must be set vid value The range is 1 4095 and can be set to any ip value For example 192 168 1 90 192 168 1 90 or any port value For example 1 or 1 8 or 1 3 5 or any type value For examp...

Page 210: ...t value type value action value Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 port 2 5 8 type h s action a Synopsis set name Mary vid 20 ip 192 168 1 1 192 168 1 90 Description To edit management policy record Argument name value ACL entry name vid value VLAN ID ip value IP Range port value Incoming port type value Access type action value a ccept or d eny Possible value name value No ...

Page 211: ...n d FEL2SW 26 management edit 1 show 1 Name Tom VlanID 2 IP 192 168 1 30 192 168 1 80 Type SNMP Action Deny Port 1 2 show Syntax show Description To show the specific management policy record Argument None Possible value None Example FEL2SW 26 management show 1 Name Tom VlanID 2 IP 192 168 1 30 192 168 1 80 Type SNMP Action Deny Port 1 2 ...

Page 212: ... state range Description To disable the communication capability of the port Argument range port range syntax 1 5 7 available from 1 to 26 Possible value range 1 26 Example FEL2SW 26 port disable state 12 enable state Syntax enable state range Description To enable the communication capability of the port Argument range port range syntax 1 5 7 available from 1 to 26 Possible value range 1 26 Examp...

Page 213: ...symmetric set its flow control as symmetric asymmetric set its flow control as asymmetric Possible value range 1 to 26 symmetric asymmetric symmetric or asymmetric Example FEL2SW 26 port set flow control 3 6 symmetric set speed duplex Syntax set speed duplex range auto 10 100 1000 half full Description To set up the speed and duplex of all ports Argument range port range syntax 1 5 7 available fro...

Page 214: ...ion Argument None Possible value None Example FEL2SW 26 port show description show detail counter Syntax show detail counter Description To display the detailed counting number of each port s traffic Argument port available from 1 to 26 Possible value 1 26 Example FEL2SW 26 port show detail counter 6 show media Syntax show media port Description To display the module 25 or 26 information Argument ...

Page 215: ...RX PWR none show simple counter Syntax show simple counter Description To display the summary counting of each port s traffic Argument None Possible value None Example FEL2SW 26 port show simple counter show status Syntax show status Description To display the port s current status Argument None Possible value None Example FEL2SW 26 port show status Port Media Link State Auto Nego Speed Duplex Rx ...

Page 216: ...ax disable 1p Description To disable 802 1p qos Argument None Possible value None Example FEL2SW 26 qos disable 1p disable dscp Syntax disable dscp Description To disable IP DSCP qos Argument None Possible value None Example FEL2SW 26 qos disable dscp disable qos Syntax disable qos Description To disable qos function Argument None Possible value None Example FEL2SW 26 qos disable qos ...

Page 217: ... None Example FEL2SW 26 qos disable tos enable 1p Syntax enable 1p Description To enable 802 1p qos Argument None Possible value None Example FEL2SW 26 qos enable 1p enable dscp Syntax enable dscp Description To enable IP DSCP qos Argument None Possible value None Example FEL2SW 26 qos enable dscp ...

Page 218: ...os set dscp Syntax set dscp q0 priority q1 priority q2 priority q3 priority Description To set IP DSCP qos weighting for 4 queues Argument q queue level q0 queue 0 q1 queue 1 q2 queue 2 q3 queue 3 priority priority level One queue has been assigned 2 different priorities You don t need to use all of queue but must assign queue in order Syntax 1 2 or 2 5 7 available from 0 to 63 Possible value prio...

Page 219: ...ht for 4 queues Argument wrr scheduling weighted round robin method strict scheduling strict method wrr_0 to 3 weighted for every queue Weighted range 1 55 Possible value wrr strict wrr or strict wrr_0 to 3 1 55 Example FEL2SW 26 qos set sche wrr 1 2 8 16 set tos Syntax set tos type_value q0 priority q1 priority q2 priority q3 priority Description To set IP tos qos weighting for 4 queues Argument ...

Page 220: ...range 1 to 26 mode 1 or 0 Example FEL2SW 26 qos set vip 1 6 1 show dscp Syntax show dscp Description To show IP DSCP Qos configuration Argument None Possible value None Example FEL2SW 26 qos show dscp ip diffserv classification Global QoS mode Enable QoS Disable 802 1p Priority Disable ip tos classification Enable ip diffserv classification Scheduling weighted round robin method weight wrr 0 1 wrr...

Page 221: ... 46 2 47 2 48 3 49 3 50 3 51 3 52 3 53 3 54 3 55 3 56 3 57 3 58 3 59 3 60 3 61 3 62 3 63 3 show port Syntax show port Description To show VIP port configuration Argument none Possible value none Example FEL2SW 26 qos show port Port Based Priority Global QoS mode Enable QoS Enable 802 1p Priority Disable ip tos classification Disable ip diffserv classification Port No Mode Port No Mode 1 Enable 2 E...

Page 222: ... tag 802 1p priority Global QoS mode Enable QoS Enable 802 1p Priority Disable ip tos classification Disable ip diffserv classification Scheduling weighted round robin method weight wrr 0 1 wrr 1 1 wrr 2 8 wrr 3 16 weighted range 1 55 P0 7 Priority 0 7 Default mode Queue0 P0 P1 Queue1 P2 P3 Queue2 P4 P5 Queue3 P6 P7 P0 P1 P2 P3 P4 P5 P6 P7 Queue 0 0 1 1 2 2 3 3 ...

Page 223: ...uling weighted round robin method weight wrr 0 1 wrr 1 1 wrr 2 8 wrr 3 16 weighted range 1 55 P0 7 Priority 0 7 Default mode Queue0 P0 P1 Queue1 P2 P3 Queue2 P4 P5 Queue3 P6 P7 P0 P1 P2 P3 P4 P5 P6 P7 Queue 0 0 1 1 2 2 3 3 TOS type Delay Priority P0 P1 P2 P3 P4 P5 P6 P7 Queue 0 0 1 1 2 2 3 3 TOS type Throughput Priority P0 P1 P2 P3 P4 P5 P6 P7 Queue 0 0 1 1 2 2 3 3 TOS type Reliability Priority P0...

Page 224: ...e function of the isolated group Argument port isolated port range syntax 1 5 7 available from 0 to 26 set 0 as disabled Possible value port 0 to 26 Example FEL2SW 26 security isolated group set 2 3 4 show Syntax show Description To display the current setting status of isolated group Argument None Possible value None Example FEL2SW 26 security isolated group show Isolated group 2 3 4 ...

Page 225: ...set Syntax set spy ingress egress Description To set up the monitoring port and monitored ports of the mirror function User can monitor the ports that receive or transmit the packets Argument spy monitoring port ingress monitored ingress port range syntax 1 5 7 available from 0 to 26 egress monitored egress port range syntax 1 5 7 available from 0 to 26 set ingress egress to 0 as ingress egress di...

Page 226: ...tricted group Argument ingress ingress group port range syntax 1 5 7 available from 0 to 26 egress egress group port range syntax 1 5 7 available from 0 to 26 set ingress or egress to 0 as disabled Possible value ingress 0 to 26 egress 0 to 26 Example FEL2SW 26 security restricted group set 5 8 10 show Syntax show Description To display the current setting status of restricted group Argument None ...

Page 227: ...nity Argument None Possible value None Example FEL2SW 26 snmp disable set community FEL2SW 26 snmp disable snmp enable Syntax enable set community enable snmp Description The Enable here is used for the activation snmp or set community Argument None Possible value None Example FEL2SW 26 snmp enable set community FEL2SW 26 snmp enable snmp ...

Page 228: ...mp set set community private FEL2SW 26 snmp set trap 1 192 168 1 1 162 public show Syntax show Description The Show here is to display the configuration of SNMP Argument None Possible value None Example FEL2SW 26 snmp show SNMP Enable Get Community public Set Community private Enable Trap Host 1 IP Address 192 168 1 1 Port 162 Community public Trap Host 2 IP Address 0 0 0 0 Port 162 Community publ...

Page 229: ...om 1 to 26 Possible value range 1 to 26 Example FEL2SW 26 stp Mcheck 1 8 disable Syntax disable Description To disable the function of STP Argument None Possible value None Example FEL2SW 26 stp disable enable Syntax enable Description To enable the function of STP Argument None Possible value None Example FEL2SW 26 stp enable ...

Page 230: ...61440 2 20 15 set port Syntax set port range path cost priority edge_port admin p2p Description To set up the port information of STP Argument range syntax 1 5 7 available from 1 to 26 path cost 0 1 200000000 The value zero means auto status priority priority must be a multiple of 16 available from 0 to 240 edge_port Admin Edge Port yes no admin p2p Admin point to point auto true false Possible va...

Page 231: ...5 Force Version RSTP show port Syntax show port Description To display the port information of STP Argument None Possible value None Example FEL2SW 26 stp show port Port Port Status Path Cost Priority Admin Edge Port Admin Point To Point 1 DISCARDING 2000000 128 Yes Auto 2 DISCARDING 2000000 128 Yes Auto 3 DISCARDING 2000000 128 Yes Auto 4 DISCARDING 2000000 128 Yes Auto 5 DISCARDING 2000000 128 Y...

Page 232: ...SW 26 stp show status STP Status STP State Enabled Bridge ID 00 40 C7 D8 09 1D Bridge Priority 61440 Designated Root 00 40 C7 D8 09 1D Designated Priority 61440 Root Port 0 Root Path Cost 0 Current Max Age sec 20 Current Forward Delay sec 15 Hello Time sec 2 STP Topology Change Count 0 Time Since Last Topology Change sec 848 ...

Page 233: ...ice name device name Description To set the device name description of the switch Argument device name string length up to 40 characters Possible value device name A b c d z and 1 2 3 etc Example FEL2SW 26 system set device name CR 2600 set location Syntax set location location Description To set the location description of the switch Argument location string length up to 40 characters Possible va...

Page 234: ... Ethernet 2 Gigabit L2 Managed Switch Location Contact Device Name FEL2SW 26 System Up Time 0 Days 22 Hours 29 Mins 31 Secs Current Time Wed Aug 31 14 03 33 2005 BIOS Version v1 03 Firmware Version v2 04 Hardware Mechanical Version v65535 65535 v0 04 Serial Number 123 Host IP Address 192 168 1 1 Host MAC Address 00 40 c7 08 00 00 Device Port UART 1 TP 24 Fiber 2 RAM Size 16 M Flash Size 2 M ...

Page 235: ...server Argument ip the IP address of tftp server Possible value ip tftp server IP Example FEL2SW 26 tftp set server 192 168 3 111 show Syntax show Description To display the information of tftp server Argument None Possible value None Example FEL2SW 26 tftp show Tftp Server 192 168 3 111 ...

Page 236: ...ving end Day 01 31 hh daylight saving end Hour 00 23 Possible value hr 5 to 5 MM 01 12 DD 01 31 HH 00 23 mm 01 12 dd 01 31 hh 00 23 Example FEL2SW 26 time set daylightsaving 3 10 12 01 11 12 01 set manual Syntax set manual YYYY MM DD hh mm ss Description To set up the current time manually Argument YYYY Year 2000 2036 MM Month 01 12 DD Day 01 31 hh Hour 00 23 mm Minute 00 59 ss Second 00 59 Possib...

Page 237: ...8 Synchronizing 1 Synchronization success show Syntax show Description To show the time configuration including Current Time NTP Server Timezone Daylight Saving Daylight Saving Start and Daylight Saving End Argument None Possible value None Example FEL2SW 26 time show Current Time Wed Apr 21 06 16 22 2005 NTP Server 209 81 9 7 Timezone 8 Day light Saving 4 Hours Day light Saving Start Mth 2 Day 20...

Page 238: ...t hash method Description To set up trunk hash method Argument method lacp hash method 0 DA and SA 1 SA 2 DA Note This hash method applies to both LACP and static trunk Possible value method 0 2 Example FEL2SW 26 trunk set hash 2 set priority Syntax set priority range Description To set up the LACP system priority Argument range available from 1 to 65535 Possible value range 1 to 65535 Example FEL...

Page 239: ...regation control protocol group 1 3 active LACP passive active active set the LACP to active mode passive set the LACP to passive mode Possible value port range 1 to 26 method static or lacp group 1 3 active LACP active or passive Example FEL2SW 26 trunk set trunk 2 5 lacp 1 active show aggtr view Syntax show aggtr view Description To display the aggregator list Argument None Possible value None E...

Page 240: ...lacp detail Syntax show lacp detail aggtr Description To display the detailed information of the LACP trunk group Argument aggtr aggregator available from 1 to 26 Possible value aggtr 1 to 26 Example FEL2SW 26 trunk show lacp detail 2 Aggregator 2 Information Actor Partner System Priority MAC Address System Priority MAC Address 32768 00 40 c7 e8 00 02 32768 00 00 00 00 00 00 Port Key Trunk Status ...

Page 241: ...ady 2 LACP 1 Active 2 3 LACP 1 Active 3 4 LACP 1 Active 4 5 LACP 1 Active 5 6 None 0 Active 6 7 None 0 Active 7 8 None 0 Active 8 9 None 0 Active 9 10 None 0 Active 10 11 None 0 Active 11 12 None 0 Active 12 13 None 0 Active 13 14 None 0 Active 14 15 None 0 Active 15 16 None 0 Active 16 17 None 0 Active 17 18 None 0 Active 18 19 None 0 Active 19 20 None 0 Active 20 21 None 0 Active 21 22 None 0 Ac...

Page 242: ... vlan del port group vlan 2 del tag group Syntax del tag group vid Description To delete the tag based vlan group Argument vid vlan ID available from 1 to 4094 Possible value vid 1 to 4094 Example FEL2SW 26 vlan del tag group 2 disable double tag Syntax disable double tag Description To disable double tag Argument None Possible value None Example FEL2SW 26 vlan disable double tag ...

Page 243: ...ssible value port_range 1 to 26 Example FEL2SW 26 vlan disable drop untag 2 4 5 7 disable svl Syntax disable svl Description To enable Independent VLAN Learning Argument None Possible value None Example FEL2SW 26 vlan disable svl disable symmetric Syntax disable symmetric Description To Not drop frames from the non member port Argument None Possible value None Example FEL2SW 26 vlan disable symmet...

Page 244: ...able drop untag port_range Description To enable drop untag Argument port_range which port s you want to drop untagged frames Syntax 1 5 7 available from 1 to 26 Possible value port_range 1 to 26 Example FEL2SW 26 vlan enable drop untag 2 4 5 7 enable svl Syntax enable svl Description To enable Shared VLAN Learning Argument None Possible value None Example FEL2SW 26 vlan enable svl ...

Page 245: ...able this feature vid management vlan id Possible value state 0 for disable 1 for enable vid 1 to 4094 Example FEL2SW 26 vlan set mgt vlan 1 1 set mode Syntax set mode port tag Description To switch vlan mode between port based and tag based modes Argument port tag port or tag tag set tag based vlan port set port based vlan Possible value port tag port or tag Example FEL2SW 26 vlan set mode tag se...

Page 246: ... you want to set available from 0 to 7 Possible value port_range 1 to 26 pvid 1 to 4094 default_priority 0 to 7 Example FEL2SW 26 vlan set pvid 3 5 6 8 5 6 set tag group Syntax set tag group vid name member_range untag_range Description To add or edit the tag based vlan group Argument vid vlan id from 1 to 4094 name tag vlan group name member_range member port syntax 1 5 7 available from 1 to 26 u...

Page 247: ...etric SVL Disable IVL Double tag Disable show group Syntax show group Description To display vlan mode and vlan group Argument None Possible value None Example FEL2SW 26 vlan show group Vlan mode is tag based 1 Name default VID 1 Member 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Untag 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 2 Name VLAN 2 VID 2...

Page 248: ... drop untag result Argument None Possible value None Example FEL2SW 26 vlan show pvid Port PVID Priority Drop Untag 1 1 0 Disable 2 1 0 Disable 3 5 6 Disable 4 1 0 Disable 5 5 6 Disable 6 5 6 Disable 7 5 6 Disable 8 5 6 Disable 9 1 0 Disable 10 1 0 Disable 11 1 0 Disable 12 1 0 Disable 13 1 0 Disable 14 1 0 Disable 15 1 0 Disable 16 1 0 Disable 17 1 0 Disable 18 1 0 Disable 19 1 0 Disable 20 1 0 D...

Page 249: ...one Example FEL2SW 26 vs disable enable Syntax enable Description To enable the virtual stack Argument None Possible value None Example FEL2SW 26 vs enable set gid Syntax set gid gid Description To set the group id Argument gid group ID Possible value gid a z A Z 0 9 Example FEL2SW 26 vs set gid group1 ...

Page 250: ...ster slave act as slave Possible value master slave master or slave Example FEL2SW 26 vs set role master show Syntax show Description To display the configuration of the virtual stack Argument None Possible value None Example FEL2SW 26 vs show Virtual Stack Config State Enable Role Master Group ID group1 ...

Page 251: ...ion ports are used on that Managed Switch Please check the uplink setup of the Managed Switch to verify the uplink function is enabled 3 The console interface cannot appear on the console port connection The COM port default parameters are Baud Rate 57600 Data Bits 8 Parity Bits None Stop Bit A Flow Control None Please check the COM port property in the terminal program And if the parameters are c...

Page 252: ...tomatic learning and aging Auto aging with programmable inter age time Supports 802 1p Class of Service with 4 level priority queuing Supports port sniffer function with 3 modes TX Monitor Mode RX Monitor Mode and TX RX pair Monitor Mode Supports port based VLAN 802 1Q tag based VLAN with 256 entries Efficient self learning and address recognition mechanism enables forwarding rate at wire speed We...

Page 253: ...cond Forwarding Rate Speed 1 488 000PPS 1000Mbps 148 800PPS 100Mbps 14 880PPS 10Mbps MAC Address and Self learning 8K address table entries 256 VLAN table entries 256 IP multicast table entries Buffer Memory Embedded 256KB packet buffers and 128KB control memory Flow Control IEEE802 3x compliant for full duplex Backpressure flow control for half duplex Cable and Maximum Length TP Cat 5 UTP cable u...

Page 254: ... 10 100M TP Port 1 to 24 LINK ACT FDX SPD 1000M Fiber TP Port 25 26 LINK ACT FDX SPD Power Requirement AC Line Voltage 100 240 V Frequency 50 60 Hz Consumption 15W Ambient Temperature 0 to 40 C Humidity 5 to 90 Dimensions 44 H 442 W 209 D mm Compliance FCC Part 15 Class A CE Mark Approval ...

Page 255: ...s Class of Service CoS by the IEEE 802 1P standard Four queues per port Packet transmission schedule using Weighted Round Robin WRR User defined weight Classification of packet priority can be based on either a VLAN tag on packet or a user defined port priority Port Security Limit number of MAC addresses learned per port static MAC addresses stay in the filtering table Internetworking Protocol Bri...

Page 256: ...rface The table below shows the pin assignments for the DB 9 cable Function Mnemonic Pin Carrier CD 1 Receive Data RXD 2 Transmit Data TXD 3 Data Terminal Ready DTR 4 Signal Ground GND 5 Data Set Ready DSR 6 Request To Send RTS 7 Clear To Send CTS 8 9 Pin Null Modem Cable CD 1 4 DTR DSR 6 1 CD DTR 4 6 DSR RXD 2 3 TXD TXD 3 2 RXD GND 5 5 GND RTS 7 8 CTS CTS 8 7 RTS Reserve 9 9 Reserve ...

Reviews: